Apparatus and method for exchanging cryptographic information with reduced overhead and latency

a cryptographic information and overhead-reducing technology, applied in the field of cryptographic information exchange, can solve the problems of key encryption, more computation and/or memory, and difficulty in secure key exchange itsel

Active Publication Date: 2020-04-21
HOLOGRAM INC
View PDF8 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Symmetric key encryption can provide efficient, secure encryption in cases where keys can be securely exchanged, stored, and maintained, assuming keys are not compromised and plaintext data is sufficiently padded to prevent against attacks (e.g., based upon known plaintext); however, in many cases, secure key exchange itself proves to be difficult where symmetric key encryption, alone, is used.
Asymmetric key encryption provides an alternative to purely-symmetric key encryption, where a public key can be disclosed publicly and even over an insecure medium (susceptible to eavesdroppers), but without compromising plaintext encrypted using the public key, assuming that the corresponding private key remains securely stored and maintained; however, asymmetric key encryption can require more computation and/or more memory when compared to purely-symmetric key encryp...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Apparatus and method for exchanging cryptographic information with reduced overhead and latency
  • Apparatus and method for exchanging cryptographic information with reduced overhead and latency
  • Apparatus and method for exchanging cryptographic information with reduced overhead and latency

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017]FIG. 1 illustrates a system 100 including a first computer 102 associated with a first user and a second computer 104 associated with a second user. The first computer 102 and second computer 104 communicate via a network 106, which may be any combination of wired and wireless networks. The first computer includes a processor (e.g., central processing unit or CPU) 110 and input / output devices 112 connected via a bus 114. The input / output devices 112 may include a keyboard, mouse, touch display and the like. A network interface circuit 116 is also connected to the bus 114 to provide connectivity to network 106. A memory 120 is also connected to the bus 114. The memory 120 stores a crypto module 122. The crypto module 122 includes instructions executed by processor 110 to implement operations disclosed herein.

[0018]The second computer 104 includes similar components, including a central processing unit 130, input / output devices 132, a bus 134, a network interface circuit 136 and...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A method implemented by computers includes exchanging a key between a first user and a second user. Ephemeral session keys are generated. The ephemeral session keys are generated by a first computer associated with the first user and a second computer associated with the second user. An encrypted key generation response is exchanged between the first computer and the second computer. A new session request is received. It is determined that there is a valid session state. It is confirmed that there is a valid user. It is determined that there is a valid session identification. Information between the first computer and the second computer is cryptographically exchanged in response to the valid session state, the valid user and the valid session identification.

Description

CROSS-REFERENCE TO RELATED APPLICATION[0001]This application claims priority to U.S. Provisional Patent Application Ser. No. 62 / 417,198, filed Nov. 3, 2016, the contents of which are incorporated herein by reference.FIELD OF THE INVENTION[0002]This application relates generally to cryptography. More particularly, this invention is directed toward techniques for exchanging cryptographic information with reduced overhead and latency.BACKGROUND OF THE INVENTION[0003]Symmetric key encryption can provide efficient, secure encryption in cases where keys can be securely exchanged, stored, and maintained, assuming keys are not compromised and plaintext data is sufficiently padded to prevent against attacks (e.g., based upon known plaintext); however, in many cases, secure key exchange itself proves to be difficult where symmetric key encryption, alone, is used.[0004]Asymmetric key encryption provides an alternative to purely-symmetric key encryption, where a public key can be disclosed publ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08H04L9/32H04L9/06
CPCH04L9/0825H04L9/0838H04L9/085H04L9/3236H04L9/0643H04L9/0656H04L9/0861H04L9/3215H04L9/3242
Inventor WILBUR, PATRICK F.LINDEMANN, BRIANLARSON, ERIK
Owner HOLOGRAM INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products